Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Law

A Chose By Any Other Name: Domain Names As A Security Interest, Andrew B. Cochran Apr 2004

A Chose By Any Other Name: Domain Names As A Security Interest, Andrew B. Cochran

Canadian Journal of Law and Technology

There has been increasing study of the issues involved in using intellectual property as a security interest, but little corresponding consideration of domain names. The ascendancy in value of domain names to modern business increases their usefulness as a security interest to lenders and borrowers alike. Their use in this respect appears not to be weighed down by two of the most difficult issues facing intellectual property, namely conflicting jurisdiction between federal statutory interests and provincial property interests, together with establishing more readily acceptable methods of valuation. However, there is ambiguity about the actual form of ownership interest involved with …


The Hegemony Of The Copyright Treatise, Ann Bartow Jan 2004

The Hegemony Of The Copyright Treatise, Ann Bartow

Law Faculty Scholarship

This Article asserts that major conceptions about the appropriate structure, texture, and span of copyright protections and privileges have been fashioned by copyright treatises, particularly the various editions of Nimmer on Copyright. Copyright treatises function in concert with the machinations of Congress, the courts, and custom, but their role is not often scrutinized.

Because copyright treatises typically do a far better job than Congress or the courts of explicating copyright law in straightforward and accessible language, such treatises can not only communicate the copyright law, but also influence its development and direction. Policy makers no doubt understand that content owners …


Defending Cyberproperty, Patricia L. Bellia Jan 2004

Defending Cyberproperty, Patricia L. Bellia

Journal Articles

This Article explores how the law should treat legal claims by owners of Internet-connected computer systems to enjoin unwanted uses of their systems. Over the last few years, this question has become increasingly urgent and controversial, as system owners have sought protection from unsolicited commercial e-mail and from robots that extract data from Web servers for competitive purposes. In the late 1990s and early 2000s, courts utilizing a wide range of legal doctrines upheld claims by network resource owners to prevent unwanted access to their computer networks. The vast weight of legal scholarship has voiced strong opposition to these cyberproperty …